IPv6 header insertion in a controlled domain

otroan@employees.org Sun, 08 December 2019 09:25 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F18E3120088 for <ipv6@ietfa.amsl.com>; Sun, 8 Dec 2019 01:25:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YFptDdrBr5_M for <ipv6@ietfa.amsl.com>; Sun, 8 Dec 2019 01:25:00 -0800 (PST)
Received: from clarinet.employees.org (clarinet.employees.org [IPv6:2607:7c80:54:3::74]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82DF312004E for <ipv6@ietf.org>; Sun, 8 Dec 2019 01:24:59 -0800 (PST)
Received: from astfgl.hanazo.no (246.51-175-81.customer.lyse.net [51.175.81.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id D9FF64E11AD9; Sun, 8 Dec 2019 09:24:58 +0000 (UTC)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by astfgl.hanazo.no (Postfix) with ESMTP id 86C52254CB72; Sun, 8 Dec 2019 10:24:56 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3601.0.10\))
Subject: IPv6 header insertion in a controlled domain
From: otroan@employees.org
In-Reply-To: <CAO42Z2ze7tmkGh=E-YrPuJHMeD8V6EuxgjjaJ33iz+Ms3abNsA@mail.gmail.com>
Date: Sun, 08 Dec 2019 10:24:56 +0100
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <ED9B7C60-ACDE-4107-A121-AE2DAEA6B640@employees.org>
References: <CALx6S3588ja9AZzBQ0dqwx0j-ki6A5tusye+odQKPyAyF+hEww@mail.gmail.com> <10E890EA-3278-44EE-881E-EBC91D419587@employees.org> <88287cb0-c0c3-f990-4dd7-338df87c7fb2@joelhalpern.com> <4E76C386-FB1E-4E48-814D-BB626466BEE3@employees.org> <CAO42Z2ze7tmkGh=E-YrPuJHMeD8V6EuxgjjaJ33iz+Ms3abNsA@mail.gmail.com>
To: Mark Smith <markzzzsmith@gmail.com>
X-Mailer: Apple Mail (2.3601.0.10)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/Hjh8e8MDmOG1qPgR7pAzELCNSHY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Dec 2019 09:25:02 -0000

Mark,

[...]
[renamed thread]

> Take an example of 3 routers A, B and C that is under the same control.
> Traffic travels from left to right.
> 
> A -- B -- C
> 
> A has a tunnel to C using ULA source and destination.
> A packet ingresses on A, is encapsulated and forwarded towards C.
> A has for reasons unknown to us outsourced a function to B. Where B insert an extension header in the packet originated by A.
> C is also in on the game, being a tunnel end-point, removing the encapsulating header and extension header.
> 
> If you can leave the nuances of SR and the whatever they propose on the shelf for a minute.
> 
> Do you agree in principle that this approach of "header insertion in a controlled domain" can be made to work,
> and should be indiscernible from A inserting the extension header itself?

Yes, there are obviously many ways of skinning this cat.
In this thread I don't want to try solve whatever problem the EH insertion camp wants solved. I don't think I understand it well enough.
And I'm unconvinced the 6man group in general understands the underlaying routing problems leading to the proposed solution.
What I was interested in exploring in this thread was if we could reach agreement that there in principle is a safe way of doing header insertion.

In my simple example above.
Do you agree that in a controlled distributed system there is no perceivable difference between node A inserting the header or node B doing it?
Conceptually you could think of it as a tunnel with muliple endpoints (although that's a bit hard to visualize ;-)).

Can we agree that inserting headers and changing the packet size among participating nodes in a distributed system is not inherently unsafe?
As far as I can think of the only complication to be considered is that node A must be aware of packet size changes when doing PMTU estimation.
(typically though in these types of networks, one simply declares that "MTU must be well managed. i.e. large enough".

Cheers,
Ole